Out-of-bounds Write Affecting apache2 package, versions <2.4.54-2ubuntu1.1
Threat Intelligence
EPSS
0.13% (49th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU2210-APACHE2-3235083
- published 19 Jan 2023
- disclosed 17 Jan 2023
Introduced: 17 Jan 2023
CVE-2006-20001 Open this link in a new tabHow to fix?
Upgrade Ubuntu:22.10
apache2
to version 2.4.54-2ubuntu1.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream apache2
package and not the apache2
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.10
relevant fixed versions and status.
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.
This issue affects Apache HTTP Server 2.4.54 and earlier.
CVSS Scores
version 3.1